CVE-2024-47832
CVSS V2 None
CVSS V3 None
Description
ssoready is a single sign on provider implemented via docker. Affected versions are vulnerable to XML signature bypass attacks. An attacker can carry out signature bypass if you have access to certain IDP-signed messages. The underlying mechanism exploits differential behavior between XML parsers. Users of https://ssoready.com, the public hosted instance of SSOReady, are unaffected. We advise folks who self-host SSOReady to upgrade to 7f92a06 or later. Do so by updating your SSOReady Docker images from sha-... to sha-7f92a06. There are no known workarounds for this vulnerability.
Overview
- CVE ID
- CVE-2024-47832
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-10-09T18:32:19.800Z
- Last Modified Date
- 2024-10-09T20:35:46.711Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/ssoready/ssoready/security/advisories/GHSA-j2hr-q93x-gxvh | x_refsource_CONFIRM |
https://github.com/ssoready/ssoready/commit/7f92a0630439972fcbefa8c7eafe8c144bd89915 | x_refsource_MISC |
https://ssoready.com/docs/self-hosting/self-hosting-sso-ready | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-47832 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47832 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-10-10 13:25:58 | Added to TrackCVE |